Ch.3 and 4 Computer Concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The main directory maintained by your computer's operating system is the ____ directory.

root

The process of overcoming limitations imposed by mobile service providers on an Android phone is called ____.

rooting

To get rid of software you no longer want from a PC, you ____.

run an uninstall routine

The file system used by Mac OS is ____.

HFS+

n the accompanying figure, Reggae is an example of a ____.

secondary folder

A virus signature is a ____.

section of program code used to identify a known malicious program

As shown in the accompanying figure, a(n) ____ is a legal contract that defines the ways in which you may use a computer program.

softwar license

A command to print a document is relayed through various levels of ____.

software

The term rootkit refers to ____.

software tools used to conceal malware and backdoors

An extension of .wav designates a ____ type of file.

sound

A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.

submenu

An extension of .ocx designates a ____ type of file.

support

In the accompanying figure, the files marked C is a(n) ____.

support program file

A file ____, in the context of Windows, is a piece of information that describes a file.

tag

One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.

tree

To delete data from a disk in such a way that no one can ever read it, you should ____.

use special file shredder software

____ may be sold or distributed free of charge in compiled form but must always include the source code.

Open source software

Adobe Reader works with files stored in standard ____ format.

PDF

____ simply requires you to fill out a form with the type of data you want to locate in a database.

QBE

The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.

utility

The Windows ____ is a database that keeps track of your computer's peripheral devices, software, preferences, and settings.

Registry

In the accompanying figure, the item marked C is a(n) ____.

value

VMWare and Parallels Desktop software are examples of ____.

virutal machine software

Spreadsheets are particularly useful for ____.

what-if analysis

3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.

wireframes

A General Purpose License, or GPL, allows anyone to make copies for their own use or to give or sell to others.

TRUE

A jailbreak lasts until you accept a software update from Apple.

TRUE

A new version update usually installs in a similar way as you installed the original version.

TRUE

A quarantined file is generally encrypted before storing.

TRUE

A root directory can be subdivided into smaller lists.

TRUE

A zombie is a computer under the control of a bad bot.

TRUE

CAD software is designed to be used by architects and engineers.

TRUE

During a typical computing session, your computer might run an average of 50 processes.

TRUE

In a dual boot system, to change operating systems, you have to reboot.

TRUE

In the GUI shown in the accompanying figure there are two application windows: calculator and word processor.

TRUE

Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks.

TRUE

Often file management is represented by a tree metaphor.

TRUE

On PCs, executable files have an .exe extension.

TRUE

Open source software is copyrighted.

TRUE

Spreadsheet software provides built-in formulas.

TRUE

The sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process.

TRUE

Third-party software companies offer additional products that extend and improve upon those supplied by the operating system.

TRUE

Today's Windows operating systems do not require a kernel that accesses DOS.

TRUE

Utility software includes diagnostics that track down and fix disk errors.

TRUE

Viruses can damage files to the point that your computer can't access any data on its hard disk.

TRUE

When you use Windows, Mac OS, or a Linux graphical file manager, each subdirectory is depicted as a folder.

TRUE

Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.

word processing

An example of software most commonly associated with productivity software is ____.

word processing software

Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document.

wrap

The operating system that was developed in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is ____.

UNIX

An easy way to back up your important data is simply by copying selected files to a ____.

USB flash drive

In the accompanying figure, the word "Calculator" appears in ____.

an Application window

In the accompanying figure, "Untitled" Word Document appears in a(n) ____.

application window

To avoid security threats, a user can ____.

avoid opening suspicious email attachments

You can use the results from a search on a database in all of these ways EXCEPT to ____.

create records

In a(n) ____ installation, the setup program displays a list of software features for your selection.

custom

In the accompanying figure, the item marked A represents ____.

data

In the accompanying figure, the file marked A is a(n) ____.

data file

Portable software is ____.

designed to run from removable storage

Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.

desktop publishing

The operating system, application software, and ____ are organized similar to the chain of command in an army.

device drivers

A ____ displays the options associated with a command.

dialog box

A(n) ____ backup contains any files that were added or changed since the last full backup.

differential

The item shown in the accompanying figure is ____.

displayed on-screen when you first install software

A Linux ____ contains the Linux kernel, system utilities, GUI, applications, and installation routine.

distribution

In the accompanying figure, the icons at the bottom of the screen appear in the ____.

dock

In the accompanying figure, C: is an example of a(n) ____.

drive

The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.

encrypted

During product activation, you must ____.

enter a product key

In the accompanying figure, the file marked B is a(n) ____.

executable file

Most hard disks are formatted by the ____.

factory

In the accompanying figure, the items marked C represent ____.

fields

An optional file identifier that is separated from a main file name by a period is a ____.

file extension

In the accompanying figure, mp3 is an example of a ____.

file extension

The accompanying figure is an example of a(n) ____ utility.

file management

In the accompanying figure, Marley One Love is an example of a ____.

file name

A computer file's location is defined by a ____.

file specification

In the Mac OS, the data ____ contains data or the commands for a program.

fork

In the Mac OS, the resource ____ stores information about the data.

fork

Files maintained by the Macintosh operating system can have two parts, called ____.

forks

Files stored in noncontiguous clusters are ____.

fragmented

A(n) ____ installation gives you access to all features of the software.

full

A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.

full

The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.

fully justified

Software considered to be utility software is ____.

hard disk backup software

Product activation can create a ____ based on your validation code and your computer's internal serial number.

hash value

At the upper-right corner of the accompanying figure, the object labeled "Macintosh HD" is an example of a(n) ____.

icon

A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.

image

A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.

incremental

Activities associated with resource management by an operating system include all of the following EXCEPT ____.

installing new memory

Indicators of pirated software include all of the following EXCEPT software that ____.

is downloaded

The strengths of Mac OS do NOT include ____.

its use of resource forks

iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.

jailbreak

In the accompanying figure, the item marked B is a(n) ____.

label

Weaknesses of Mac OS include ____.

limited selection of applications

If your backups are ____, keep them in a safe place.

local

Utilities, like the one shown in the accompanying figure, often use some sort of storage metaphor to help you visualize and mentally organize the files on your disks. The metaphors are called ____ storage models.

logical

Through many editions, the Windows user interface was characterized by a colorful Start button in the ____ corner of the screen.

lower-left

An operating system's ____ capability supports a division of labor among all the processing units.

multiprocessing

Within a single program, ____ allows multiple parts to run simultaneously.

multithreading

Web sites that offer storage space for backups are called ____ backup services.

online

A shrink-wrap license goes into effect as soon as you ____.

open it

A(n) ____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.

operating

In relation to disks, ____ is a recording technology that lets you record in multiple sessions.

packet writing

A description of what actually happens on the disk and in the circuits is represented by a ____.

physical storage model

RIM is the ____ company that developed the BlackBerry smartphone.

Canadian

In the accompanying figure, Music is an example of a ____.

primary folder

A service pack ____.

provides updates to the operating system

Software that may be freely copied, distributed, and even resold is ____.

public domain

To find a particular record or group of records in a database, you use a(n) ____.

query

When using word processing software to analyze the reading level of your document, you should use a ____.

readability formula

Application software is designed to accomplish ____ tasks.

real-world

In the accompanying figure, the index card represents a single database ____.

record

A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard disk as it existed when the computer was new.

recovery

The strengths of Microsoft Windows include all of the following EXCEPT ____.

reliability

Security suites can be ____.

all of the above

The difference between the Save and the Save As commands is that ____.

all of the above

You should consider making backups of your ____.

all of the above

____ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.

Disc mastering

File management capabilities available from application software include ____ files.

all of the above

Support program files for PC applications often have a(n) ____ extension.

.dll

Current versions of Windows support file names up to ____ characters long.

255

Microsoft Windows is installed on more than ____ of the world's personal computers.

80%

____ utilities alter a user's interface to create an accessible environment.

Adaptive

Most applications for PCs consist of multiple files. Additional files contain support modules called ____.

All of the above

All of the following are examples of resources EXCEPT ____.

All of the above are resources

____ is typically sold in computer stores or at Web sites.

Commercial software

____ is typically available as a trial version

Demoware

A button allows you to select one item from several options.

FALSE

A file extension is always the same as a file format.

FALSE

A virus signature is a digitally signed certificate that certifies the file is virus-free.

FALSE

Antivirus software does not require any updates.

FALSE

By using spell checkers and grammar checkers, you are assured your document will be error-free.

FALSE

During the boot process, RAM is loaded into the operating system kernel.

FALSE

Even after the media containing portable software is removed from a computer, some traces of the software are left there.

FALSE

File management utilities usually retain the files within a folder when that folder is deleted.

FALSE

Files that are zipped contain consolidated files that are compressed and ready to execute.

FALSE

Folders cannot be created within other folders.

FALSE

If you purchase software, it belongs to you, and you can do what you want, including copying it.

FALSE

Local applications are installed on a local file server.

FALSE

Most Web apps, like the one shown in the accompanying figure, require installation on your local computer or handheld device.

FALSE

One of the primary strengths of Windows is security.

FALSE

Payroll software is an example of vertical market software.

FALSE

Some systems streamline the backup process by restoring a computer's operating system, device drivers, settings, and data in a single step - a process called restore pointing.

FALSE

To be certain a file can be opened by the recipient, simply save it as an .exe; then anyone can open it.

FALSE

When devices record your location, there is no possibility of abuse.

FALSE

With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection.

FALSE

In the accompanying figure, the item marked B represents ____.

a record

DVD authoring software offers tools for creating DVDs with ____-style menus.

Hollywood

____ searches are simply a collection of words relevant to a search.

Keyword

____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.

LINUX

____ applications are software that is installed on a computer's hard disk.

Local

An example of mathematical modeling software is ____.

Mathcad

A page layout includes ____.

all of the above

All the following are examples of portable applications EXCEPT ____.

Microsoft Internet Explorer

Popular presentation software products include all of the following EXCEPT ____.

Movie Maker

____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.

Multitasking

The file system used by Windows 8 is ____.

NTFS

The file system used by Windows Vista is ____.

NTFS

____ queries are questions stated in a language such as English, rather than an esoteric query language.

Natural language

____ is typically copyrighted software that is marketed under a try-before-you buy policy.

Shareware

____ compares the content of files on two devices and makes them the same.

Synchronization

The number and variety of programs that run on ____ are unmatched by any other operating system.

Windows

Web applications are ____.

accessed and run on the Web

In the accompanying figure, the item marked A is a(n) ____.

active cell

If virus protection software identifies a virus, it can try to ____.

all of the above

Mobile apps ____.

all of the above

A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.

bot

When installing a PC application, most ____ for new software are placed in the folder you specify.

both a and b

A security suite will typically include all of the following EXCEPT ____ software.

browser

The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.

buffer

The intersection of a column and a row on a spreadsheet is called a ____.

cell

A formula can contain ____ and mathematical operators.

cell references

Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are not listed consecutively, ____.

click on each file while holding down the Ctrl key

Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are listed consecutively, ____.

click on the first and last file while holding down the Shift key

A group of sectors is called a ____.

cluster

System software is designed to accomplish ____ tasks.

computer-centric

An extension of .sys designates a ____ type of file.

configuration

When you install a local application, all of its files are placed in the appropriate folders on your computer's hard disk, and then your computer performs any software or hardware ____ necessary to make sure the program is ready to run.

configurations

It is illegal to do all the following with software EXCEPT ____.

copy and keep as backup


Ensembles d'études connexes

Chapter 18 Iggy Practice Questions

View Set

ANTH 1150 Pearson Questions Chapter 9

View Set

LatinoAm 213-003: Final Exam Review

View Set

Java SE 11 Programmer I Exam - Chapter IX

View Set